Critical fixes for Office, Outlook and IE in September Patch Tuesday

By Michelle Drolet . 11 Sep 2013

Windows admins will have their hands full with the large number of security updates in this month’s Patch Tuesday. There are fixes for 47 vulnerabilities in 13 bulletins for September’s Patch Tuesday cycle. Four of this month’s bulletins are critical. This year’s total for bulletins is up to 79, a considerable increase from 62 at … Continue reading Critical fixes for Office, Outlook and IE in September Patch Tuesday

Phone 5S Phishing Mail Arrives in time for launch.

By Michelle Drolet . 11 Sep 2013

While millions of mobile users are anticipating the launch of the new iPhone (5S and 5C), cybercriminals are already making their move to distribute spam that promise to give away the said devices for free, in the guise of a contest. We saw samples of spammed messages that attempted to spoof an Apple Store email … Continue reading Phone 5S Phishing Mail Arrives in time for launch.

Read the EDA’s Report on Malware Infections

By Michelle Drolet . 29 Jul 2013

Read the EDA’s Report on Malware Infections – Malware Infections on EDA’s Systems Were Overstated and the Disruption of IT Operations Was Unwarranted Click here to read.

Four Steps to Respond & Recover from Sophisticated Security Attacks

By Michelle Drolet . 29 Jul 2013

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated … Continue reading Four Steps to Respond & Recover from Sophisticated Security Attacks

Introducing Towewall’s Alternative Cloud-based File Sharing Solutions

By Michelle Drolet . 27 Jun 2013

Towerwall is proud to offer our new Alternative Cloud-based File Sharing Solutions Cloud based file synchronization services have exploded. Organizations need to be able to provide a modern collaboration experience with the infrastructure that they’ve already invested in, and that they already know how to manage and protect. Watch the video below for more:     … Continue reading Introducing Towewall’s Alternative Cloud-based File Sharing Solutions

Towerwall Security / Vulnerability Alert: Microsoft announces five Bulletins for Patch Tuesday, including Office for Mac

By Michelle Drolet . 13 Jun 2013

Midsummer Patch Tuesday (or midwinter, depending on your latitude) takes place on Tuesday 11 June 2013. As you probably already know, Microsoft publishes an official Advance Notification each month to give you early warning of what’s coming. These early notifications generally don’t give any details, summarizing only the basics, such as: The number of Bulletins … Continue reading Towerwall Security / Vulnerability Alert: Microsoft announces five Bulletins for Patch Tuesday, including Office for Mac

Views from the Inside: A successful BYOD policy is not just about security

By Michelle Drolet . 30 Apr 2013

The BYOD trend shows no sign of abating as more and more organizations recognize the potential benefits in terms of cost and convenience. According to a recent surveyby Good Technology, 76 percent of enterprises are now supporting BYOD and the majority of those that still don’t are planning to do so in the near future. When … Continue reading Views from the Inside: A successful BYOD policy is not just about security

Free Security Tools, Apps, and Widgets

By Michelle Drolet . 5 Apr 2013

Our friends at Trend Micro offer a range of free tools, apps and widgets to protect your devices and help you manage your online activity. You can check them out and download them for free on our Security Tools, Apps, and Widgets Page.

Verify the Security of your Mobile Apps

By Michelle Drolet . 2 Apr 2013

Network World – The enterprise is increasingly turning to mobile app developers for solutions to leverage interest in BYOD. Gartner estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018. The app development boom has fostered a competitive environment for developers and there is a focus on speed. But In the rush to deploy enterprise … Continue reading Verify the Security of your Mobile Apps

How to ensure mobile apps are secure for the enterprise

By Michelle Drolet . 12 Feb 2013

As the app revolution has gathered pace and smartphones and tablets have become ubiquitous, the importance of testing app security has grown. Many companies have embraced the BYOD trend. They may even have developed applications that enable employees to have 24/7 access to business data and tools. The benefits can be counted in productivity boosts … Continue reading How to ensure mobile apps are secure for the enterprise

Tags